Search dblp for Publications

export results for "toc:db/journals/re/re15.bht:"

 download as .bib file

@article{DBLP:journals/re/AliDG10,
  author       = {Raian Ali and
                  Fabiano Dalpiaz and
                  Paolo Giorgini},
  title        = {A goal-based framework for contextual requirements modeling and analysis},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {4},
  pages        = {439--458},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-010-0110-z},
  doi          = {10.1007/S00766-010-0110-Z},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/AliDG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/ArandaVP10,
  author       = {Gabriela N. Aranda and
                  Aurora Vizca{\'{\i}}no and
                  Mario Piattini},
  title        = {A framework to improve communication during the requirements elicitation
                  process in {GSD} projects},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {4},
  pages        = {397--417},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-010-0105-9},
  doi          = {10.1007/S00766-010-0105-9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/re/ArandaVP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/DuboisM10,
  author       = {Eric Dubois and
                  Haralambos Mouratidis},
  title        = {Guest editorial: security requirements engineering: past, present
                  and future},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {1},
  pages        = {1--5},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0094-8},
  doi          = {10.1007/S00766-009-0094-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/DuboisM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/El-AttarM10,
  author       = {Mohamed El{-}Attar and
                  James Miller},
  title        = {Developing comprehensive acceptance tests from use cases and robustness
                  diagrams},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {3},
  pages        = {285--306},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0088-6},
  doi          = {10.1007/S00766-009-0088-6},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/El-AttarM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/ElahiYZ10,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu and
                  Nicola Zannone},
  title        = {A vulnerability-centric requirements engineering framework: analyzing
                  security attacks, countermeasures, and requirements based on vulnerabilities},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {1},
  pages        = {41--62},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0090-z},
  doi          = {10.1007/S00766-009-0090-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/ElahiYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/EsmaeilsabzaliDAN10,
  author       = {Shahram Esmaeilsabzali and
                  Nancy A. Day and
                  Joanne M. Atlee and
                  Jianwei Niu},
  title        = {Deconstructing the semantics of big-step modelling languages},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {2},
  pages        = {235--265},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-010-0102-z},
  doi          = {10.1007/S00766-010-0102-Z},
  timestamp    = {Tue, 25 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/EsmaeilsabzaliDAN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/FabianGHSS10,
  author       = {Benjamin Fabian and
                  Seda F. G{\"{u}}rses and
                  Maritta Heisel and
                  Thomas Santen and
                  Holger Schmidt},
  title        = {A comparison of security requirements engineering methods},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {1},
  pages        = {7--40},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0092-x},
  doi          = {10.1007/S00766-009-0092-X},
  timestamp    = {Fri, 24 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/FabianGHSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/FerrariMM10,
  author       = {Remo Ferrari and
                  James A. Miller and
                  Nazim H. Madhavji},
  title        = {A controlled experiment to assess the impact of system architectures
                  on new system requirements},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {2},
  pages        = {215--233},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-010-0099-3},
  doi          = {10.1007/S00766-010-0099-3},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/FerrariMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/Fuentes-FernandezGP10,
  author       = {Rub{\'{e}}n Fuentes{-}Fern{\'{a}}ndez and
                  Jorge J. G{\'{o}}mez{-}Sanz and
                  Juan Pav{\'{o}}n},
  title        = {Understanding the human context in requirements elicitation},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {3},
  pages        = {267--283},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0087-7},
  doi          = {10.1007/S00766-009-0087-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/Fuentes-FernandezGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/HoumbIKJS10,
  author       = {Siv Hilde Houmb and
                  Shareeful Islam and
                  Eric Knauss and
                  Jan J{\"{u}}rjens and
                  Kurt Schneider},
  title        = {Eliciting security requirements and tracing them to design: an integration
                  of Common Criteria, heuristics, and UMLsec},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {1},
  pages        = {63--93},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0093-9},
  doi          = {10.1007/S00766-009-0093-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/HoumbIKJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/KaindlS10,
  author       = {Hermann Kaindl and
                  Davor Svetinovic},
  title        = {On confusion between requirements and their representations},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {3},
  pages        = {307--311},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0095-7},
  doi          = {10.1007/S00766-009-0095-7},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/re/KaindlS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/LiABD10,
  author       = {Chen Li and
                  Marjan van den Akker and
                  Sjaak Brinkkemper and
                  Guido Diepen},
  title        = {An integrated approach for requirement selection and scheduling in
                  software release planning},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {4},
  pages        = {375--396},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-010-0104-x},
  doi          = {10.1007/S00766-010-0104-X},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/re/LiABD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/MasseyOHA10,
  author       = {Aaron K. Massey and
                  Paul N. Otto and
                  Lauren J. Hayward and
                  Annie I. Ant{\'{o}}n},
  title        = {Evaluating existing security and privacy requirements for legal compliance},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {1},
  pages        = {119--137},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0089-5},
  doi          = {10.1007/S00766-009-0089-5},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/re/MasseyOHA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/McElroyR10,
  author       = {Jim McElroy and
                  G{\"{u}}nther Ruhe},
  title        = {When-to-release decisions for features with time-dependent value functions},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {3},
  pages        = {337--358},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-010-0097-5},
  doi          = {10.1007/S00766-010-0097-5},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/McElroyR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/MoodyHM10,
  author       = {Daniel Laurence Moody and
                  Patrick Heymans and
                  Raimundas Matulevicius},
  title        = {Visual syntax does matter: improving the cognitive effectiveness of
                  the \emph{i}* visual notation},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {2},
  pages        = {141--175},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-010-0100-1},
  doi          = {10.1007/S00766-010-0100-1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/MoodyHM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/MussbacherWA10,
  author       = {Gunter Mussbacher and
                  Jon Whittle and
                  Daniel Amyot},
  title        = {Modeling and detecting semantic-based interactions in aspect-oriented
                  scenarios},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {2},
  pages        = {197--214},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-010-0098-4},
  doi          = {10.1007/S00766-010-0098-4},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/MussbacherWA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/NavarroLL10,
  author       = {Israel Navarro and
                  Nancy G. Leveson and
                  Kristina Lundqvist},
  title        = {Semantic decoupling: reducing the impact of requirement changes},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {4},
  pages        = {419--437},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-010-0109-5},
  doi          = {10.1007/S00766-010-0109-5},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/NavarroLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/Ryan10,
  author       = {Kevin Ryan},
  title        = {Introduction to the RE'09 special issue},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {2},
  pages        = {139--140},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-010-0106-8},
  doi          = {10.1007/S00766-010-0106-8},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/Ryan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/SiveroniZS10,
  author       = {Igor Siveroni and
                  Andrea Zisman and
                  George Spanoudakis},
  title        = {A UML-based static verification framework for security},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {1},
  pages        = {95--118},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0091-y},
  doi          = {10.1007/S00766-009-0091-Y},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/SiveroniZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/SundaramHDH10,
  author       = {Senthil Karthikeyan Sundaram and
                  Jane Huffman Hayes and
                  Alex Dekhtyar and
                  Elizabeth Ashlee Holbrook},
  title        = {Assessing traceability of software engineering artifacts},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {3},
  pages        = {313--335},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0096-6},
  doi          = {10.1007/S00766-009-0096-6},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/SundaramHDH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/WhittleSBCB10,
  author       = {Jon Whittle and
                  Peter Sawyer and
                  Nelly Bencomo and
                  Betty H. C. Cheng and
                  Jean{-}Michel Bruel},
  title        = {{RELAX:} a language to address uncertainty in self-adaptive systems
                  requirement},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {2},
  pages        = {177--196},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-010-0101-0},
  doi          = {10.1007/S00766-010-0101-0},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/WhittleSBCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/WolterM10,
  author       = {Christian Wolter and
                  Christoph Meinel},
  title        = {An approach to capture authorisation requirements in business processes},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {4},
  pages        = {359--373},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-010-0103-y},
  doi          = {10.1007/S00766-010-0103-Y},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/WolterM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics